New commits:
commit 399cc1987da58c844b3da87537179f4e28515808
Author: Maciej S. Szmigiero <m...@maciej.szmigiero.name>
Date:   Sat Jul 26 23:57:52 2025 +0200

    pluto: seccomp: allow getres{gid,uid} for bash-5.3
    
    When I upgraded bash-5.2 to bash-5.3 pluto would no longer establish
    IPSec SAs throwing seccomp errors:
    2025-07-26T22:10:05.980377+02:00 host pluto: "other": prepare-host command 
exited with signal 31
    2025-07-26T22:10:05.980998+02:00 host pluto: "other": route-host command 
exited with signal 31
    2025-07-26T22:17:18.150536+02:00 host pluto: "other" #2: prepare-host 
command exited with signal 31
    2025-07-26T22:17:18.151134+02:00 host pluto: "other" #2: route-host command 
exited with signal 31
    2025-07-26T22:17:18.151730+02:00 host pluto: "other" #2: down-host command 
exited with signal 31
    
    The culprits are getres{gid,uid} syscalls, apparently used in bash-5.3:
    2025-07-26T22:10:29.258760+02:00 host kernel: audit: type=1326 
audit(1753560629.257:6): auid=1000 uid=0 gid=0 ses=4 pid=1234 comm="sh" 
exe="/bin/bash" sig=31 arch=c000003e syscall=118 compat=0 ip=0x7f2de5afcabb 
code=0x0
    2025-07-26T22:18:12.352731+02:00 host kernel: audit: type=1326 
audit(1753561092.351:9): auid=1000 uid=0 gid=0 ses=4 pid=1234 comm="sh" 
exe="/bin/bash" sig=31 arch=c000003e syscall=120 compat=0 ip=0x7fc3c20fca8b 
code=0x0
    
    Add these syscalls to pluto seccomp filter so it works correctly with the
    updated bash.
    
    Signed-off-by: Andrew Cagney <cag...@gnu.org>
    close #2371 pluto: seccomp: allow getres{gid,uid} for bash-5.3

_______________________________________________
Swan-commit mailing list -- swan-commit@lists.libreswan.org
To unsubscribe send an email to swan-commit-le...@lists.libreswan.org

Reply via email to